邵秀燕
近期热点
资料介绍
个人简历
邵秀燕毕业学校 奥卢大学(芬兰)University of Oulu 性别 女 学历 Ph.D. 籍贯 江苏南通 教育背景2012.1-2015.09奥卢大学(芬兰),信息处理科学系 Department of Information Processing Science, University of Oulu, Finland博士,专业:管理信息系统2008.9-2011.3东南大学,经济管理学院硕士,专业:国际贸易学2004.9-2008.6东南大学,经济管理学院学士,专业:国际经济与贸易工作经历2019.8-至今全职,讲师(Assistant professor)工作单位:东南大学,经济管理学院 2017.8-2019.6全职,博士后研究员(Postdoctoral researcher)工作单位:奥卢大学(芬兰),信息技术与电子工程学院,奥卢服务与信息系统高级研究组(Oulu Advanced Research on Service and Information Systems, Faulty of Information Technology and Electrical Engineering, University of Oulu, Finland)2013.5-2013.6访问研究员工作单位:新加坡国立大学,计算机学院(School of Computing, National University of Singapore)2013.2-2013.4访问研究员工作单位:于韦斯屈莱大学(芬兰),计算机科学与信息系统系(Department of Computer Science and Information Systems, University of Jyväskylä)2010.9-2013.6项目研究员工作单位: 奥卢大学(芬兰),信息处理与科学系(Department of Information Processing Science, University of Oulu, Finland)科研项目芬兰Business Finland(Tekes)的项目 “The development of a new instrument for measuring the value of information security investment”奥卢大学(芬兰)主要项目成员年度:2010-2013年 学术经历国际期刊审稿人:Journal of The Association for Information Systems; Journal of Operational Management; Behaviour & Information Technology国际会议审稿人:International Conference on Information Systems (ICIS) 2014, 2015, 2017; Hawaii International Conference on Systems Science (HICSS) 2019; PACIS 2019, 2020 教学经历指导学生硕士生,Joni Penjala,奥卢大学(芬兰),2018年1月至今,研究课题:Organizational information security management in cloud computing本科生,Antti Keistinen奥卢大学(芬兰), 2018年2月-2019年1月,研究课题:Challenges & barriers for elderly in adopting mobile health devices教学领域信息安全(个人行为,企业管理)社交媒体定量分析方法企业信息系统经济学课程 课程教学东南大学,课程:《微观经济学(全英文)》、《国际经济学(双语)》,主讲奥卢大学(芬兰),课程:企业信息安全政策与管理,年度:2013、2017,助理讲师,负责课程教学、考试安排奥卢大学(芬兰),课程:企业信息系统,年度:2014,助理讲师,负责课程教学、考试安排奥卢大学(芬兰),课程:新兴技术及其问题,年度:2018,主讲奥卢大学(芬兰),课程:企业信息安全政策与管理,年度:2018,主讲研究领域
企业信息安全管理员工信息安全行为个人社交媒体行为""近期论文
Zhang, Bobin; Shao, Xiuyan; Chen, Wei*; Bi, Fangming; Fang, Weidong; Sun, Tongfeng; Tang, Chaogang. (2019) “Visual tracking based on robust appearance model”, Image and Vision Computing, 2019, 89: 211-221; SCIE. Qiusheng HE, Xiuyan Shao, Wei CHEN, Xiaoyun LI, Xiao YANG, and Tongfeng SUN. (2019) “Adaptive Multi-Scale Tracking Target Algorithm through Drone”, IEICE TRANS. COMMUN., 2019, E102-B(10): 1998-2005.Shao, X.* & Oinas-Kukkonen, H. (2019) “How does General Data Protection Regulation (GDPR) affect persuasive system design? Design requirements and cost implications”, 14th International Conference on Persuasive Technology, PERSUASIVE 2019 (第一作者,通讯作者)Shao, X.*, Siponen, M., & Pahnila, S. (2019)“To Calculate or To Follow Others: How Do Information Security Managers Make Investment Decisions?”, Hawaii International Conference on Systems Science (HICSS 2019), 8 January 2019, Hawaii, USA(EI检索)(第一作者,通讯作者)Shao, X.* & Oinas-Kukkonen, H. (2018) “Thinking about persuasive technology from the strategic business perspective: a call for research on cost-based competitive advantage”, 13th International Conference on Persuasive Technology, PERSUASIVE 2018, Waterloo, ON, Canada, April 18-19, 2018 (第一作者,通讯作者)Shao, X. (2015) “Understanding Information Systems (IS) Security Investments in Organizations” (Doctoral dissertation). Karjalainen, M., Siponen, M., Kohli, R., and Shao, X. (2013) “What’s in it for me? A Stakeholder Theory perspective on Information Technology Security Investment”, IFIP Dewald Roode Information Security Workshop, 4-5 October 2013, New York, USA.Shao, X.* & Siponen, M. (2011). “Consumer Acceptance and Use of Information Technology: Adding consumption theory to UTAUT2”, International Conference of Information Systems(第一作者,通讯作者)邵秀燕,区域经济一体化进程中东盟投资效应分析,《世界经济与政治论坛》,2009年第5期。(CSSCI核心期刊,唯一作者)工作论文Kohli, R., Siponen, M., Karjalainen, M., & Shao, X. “Finding common ground: A behavioral theory of equilibrium in information technology security investments” Under last round review, Information Systems ResearchShao, X., and Siponen, M. Digital piracy in online communities.Shao, X., Siponen, M., Liu, F., and Pahnila, S. Calculating or imitating? How information security managers make investment decisions. Shao, X., and Siponen, M. How gamification improves information security behavior?Shao, X., and Siponen, M. How economic valuation for information security investment view underinvestment?Siponen, M., Shao, X., and Chen, S., Why Do Many Information Security Investment Models Apply Only in Idealized Counterfactual Settings? 相关热点
最新收录
- 平野真衣(Hirano-Mai) 05-22
- 上田纱奈(上田紗奈 Ueda- 05-22
- 七瀬侑良(七濑侑良,Nan 05-22
- Sien小慧君 05-22
- 罗杰叔叔(Uncle Roger) 05-22
- 悉尼妹(Sydney Sweeney) 05-22
- 玩具砖家 05-19
- 行走的大大大羊腿 05-19
- 梦飞大大 05-19
- 晏安anan 05-19